Cyber Posture

CVE-2026-40516

HighPublic PoC

Published: 17 April 2026

Published
17 April 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
EPSS Score 0.0002 6.6th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-40516 is a high-severity SSRF (CWE-918) vulnerability in Hkuds Openharness. Its CVSS base score is 8.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-9 (Information Input Restrictions).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of tool parameters like target addresses, directly preventing SSRF by rejecting manipulated inputs to private or localhost services.

prevent

SI-9 enforces restrictions on information inputs to block parameters directing requests to loopback, RFC1918, or other non-public addresses.

prevent

AC-4 enforces flow control policies that prevent unauthorized information flows from the application to internal private services exploited via SSRF.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1522 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
T1552.005 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

SSRF vuln in public-facing OpenHarness web tools allows unauthenticated remote exploitation (T1190) to query internal/localhost services, directly enabling access to cloud metadata endpoints for discovery (T1522) and credential theft (T1552.005), plus data retrieval from local HTTP services (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenHarness before commit bd4df81 contains a server-side request forgery vulnerability in the web_fetch and web_search tools that allows attackers to access private and localhost HTTP services by manipulating tool parameters without proper validation of target addresses. Attackers can influence an…

more

agent session to invoke these tools against loopback, RFC1918, link-local, or other non-public addresses to read response bodies from local development services, cloud metadata endpoints, admin panels, or other private HTTP services reachable from the victim host.

Deeper analysisAI

CVE-2026-40516 is a server-side request forgery (SSRF) vulnerability, mapped to CWE-918, affecting OpenHarness prior to commit bd4df81. The flaw exists in the web_fetch and web_search tools, which lack proper validation of target addresses, enabling requests to private and localhost HTTP services. Published on 2026-04-17, it carries a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L).

Unauthenticated remote attackers can exploit the vulnerability by influencing an agent session to invoke the affected tools with manipulated parameters. This directs requests to loopback, RFC1918, link-local, or other non-public addresses, allowing attackers to read response bodies from local development services, cloud metadata endpoints, admin panels, or other private HTTP services reachable from the victim host.

Mitigation requires updating to OpenHarness commit bd4df81 or later, as detailed in the fixing commit at https://github.com/HKUDS/OpenHarness/commit/bd4df81f634f8c7cddcc3fdf7f561a13dcbf03ae and pull request https://github.com/HKUDS/OpenHarness/pull/92. Further analysis is provided in the VulnCheck advisory at https://www.vulncheck.com/advisories/openharness-ssrf-via-web-fetch-and-web-search.

Details

CWE(s)

Affected Products

hkuds
openharness
≤ 2026-04-11

CVEs Like This One

CVE-2026-6823Same product: Hkuds Openharness
CVE-2026-40515Same product: Hkuds Openharness
CVE-2026-7551Same product: Hkuds Openharness
CVE-2026-6819Same product: Hkuds Openharness
CVE-2026-6729Same product: Hkuds Openharness
CVE-2026-40502Same product: Hkuds Openharness
CVE-2026-27732Shared CWE-918
CVE-2025-36845Shared CWE-918
CVE-2026-33039Shared CWE-918
CVE-2024-8952Shared CWE-918

References